Basic Engineering MCQ
1. Section 1 of the fourteenth amendment granted ___ rights to the newly freed slaves.
Answer
Correct Answer:
Citizenship
Note: This Question is unanswered, help us to find answer for this one
2. A brand assigned to each product within a company's product mix is a(n) ________ brand.
Answer
Correct Answer:
Individual
Note: This Question is unanswered, help us to find answer for this one
3. The concept of ____ literacy means knowing how to find, analyze, use, and communicate information.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
4. Issep stands for information systems security experienced professional. _________________________
Note: This Question is unanswered, help us to find answer for this one
5. Investments applied to the __________ level have the greatest chance of success.
Answer
Correct Answer:
Operational
Note: This Question is unanswered, help us to find answer for this one
6. "a password must have a minimum of five characters" is an example of a _____.
Note: This Question is unanswered, help us to find answer for this one
7. ________________ is hard to explain, hard to transfer, and highly personal to the source.
Answer
Correct Answer:
Tactic knowledge
Note: This Question is unanswered, help us to find answer for this one
8. __________ is the process of recovering organic waste through decomposition.
Answer
Correct Answer:
Composting
Note: This Question is unanswered, help us to find answer for this one
9. ________ is starting to be used in predictive analytics from both the public and private sectors.
Note: This Question is unanswered, help us to find answer for this one
10. _____ is one of the most common cost-effectiveness analysis methods.
Answer
Correct Answer:
Net present value
Note: This Question is unanswered, help us to find answer for this one
11. _____ could be useful for authentication purposes in voting via the internet.
Answer
Correct Answer:
Biometrics
Note: This Question is unanswered, help us to find answer for this one
12. ________ is a management methodology that translates a firm's goals into operational targets.
Note: This Question is unanswered, help us to find answer for this one
13. _____ allow synchronous communication in training.
Answer
Correct Answer:
Live online courses
Note: This Question is unanswered, help us to find answer for this one
14. Business analytics fuel ________ decision making.
Answer
Correct Answer:
Fact-based
Note: This Question is unanswered, help us to find answer for this one
15. Bluetooth can be used to create a _____ for communication among computerized devices.
Answer
Correct Answer:
Personal area network
Note: This Question is unanswered, help us to find answer for this one
16. Autonomy is ________.
Answer
Correct Answer:
Working without continual direction and control
Note: This Question is unanswered, help us to find answer for this one
17. An uninterruptable power supply contains a ____.
Note: This Question is unanswered, help us to find answer for this one
18. Adler introduced __________ to our understanding of the family system (or family constellation).
Answer
Correct Answer:
phenomenology
Note: This Question is unanswered, help us to find answer for this one
19. Windows stores files on a hard drive in 512-byte blocks called ____________________.
Note: This Question is unanswered, help us to find answer for this one
20. When you intensify a learning pattern in an assignment, you __________.
Answer
Correct Answer:
Energize a typically calm Pattern
Note: This Question is unanswered, help us to find answer for this one
21. When __________ occurs, a ripple effect flows throughout the family system.
Note: This Question is unanswered, help us to find answer for this one
22. The need for ______________ can complicate information sharing among emergency personnel.
Answer
Correct Answer:
Confidentiality.
Note: This Question is unanswered, help us to find answer for this one
23. The learning cycle for a trainee begins with a(n) _____.
Answer
Correct Answer:
Concrete experience
Note: This Question is unanswered, help us to find answer for this one
24. The internet of things connects wireless identifiable objects ________.
Answer
Correct Answer:
All of these.
Note: This Question is unanswered, help us to find answer for this one
25. The first and the most important step in choosing a training method is to identify the ________.
Answer
Correct Answer:
Type of learning outcome
Note: This Question is unanswered, help us to find answer for this one
26. Storing past experiences in the form of cases is a km method called ________.
Answer
Correct Answer:
Case-based reasoning (CBR)
Note: This Question is unanswered, help us to find answer for this one
27. Special purpose systems that help overcome disabilities or improve health are called _____.
Answer
Correct Answer:
Assistive technology
Note: This Question is unanswered, help us to find answer for this one
28. Smudges on a laptop display screen can be cleaned periodically with ____.
Answer
Correct Answer:
Eyeglass cleaner
Note: This Question is unanswered, help us to find answer for this one
29. Olfactory information is processed by the ____.
Answer
Correct Answer:
Cortex via the olfactory bulbs.
Note: This Question is unanswered, help us to find answer for this one
30. Of the following, the only original tld is ____.
Note: This Question is unanswered, help us to find answer for this one
31. Nonvolatile in the context of data storage means ________________.
Answer
Correct Answer:
The data cannot be changed or updated by users of the data warehouse
Note: This Question is unanswered, help us to find answer for this one
32. Management information systems (mis) _____ include programs developed in-house.
Answer
Correct Answer:
Software components
Note: This Question is unanswered, help us to find answer for this one
33. Lecture as a presentation method _____.
Answer
Correct Answer:
Can be easily employed with large groups of trainees
Note: This Question is unanswered, help us to find answer for this one
34. Knowledge management (km) benefits organizations because it ________.
Answer
Correct Answer:
Allows suppliers to work according to the organizational policies
Note: This Question is unanswered, help us to find answer for this one
35. Knowledge and knowledge management processes usually have a(n) ________ format.
Answer
Correct Answer:
Unstructured
Note: This Question is unanswered, help us to find answer for this one
36. Kindle, nook, and ipad are becoming increasingly popular to provide ______ to students.
Answer
Correct Answer:
Educational games.
Note: This Question is unanswered, help us to find answer for this one
37. A small and medium-sized enterprise (sme) is a legally independent enterprise with _____ employees.
Answer
Correct Answer:
Up to 500
Note: This Question is unanswered, help us to find answer for this one
38. Tps do not process data using ___________.
Note: This Question is unanswered, help us to find answer for this one
39. Graphic images can be stored in a variety of formats including _____.
Answer
Correct Answer:
JPEG and GIF
Note: This Question is unanswered, help us to find answer for this one
40. A tool used by installers to remove the case from a desktop pc is a ____.
Answer
Correct Answer:
Nut driver
Note: This Question is unanswered, help us to find answer for this one
41. ________ are an essential component of a knowledge work system.
Answer
Correct Answer:
Links to external knowledge bases
Note: This Question is unanswered, help us to find answer for this one
42. _____ was developed so that users could communicate with computers in human language.
Answer
Correct Answer:
Natural language processing
Note: This Question is unanswered, help us to find answer for this one
43. A light source that may flicker at the same rate as an older crt display screen is a(n) ____ bulb.
Answer
Correct Answer:
Fluorescent
Note: This Question is unanswered, help us to find answer for this one
44. Housed at server farms, search engines use _____ to index data coming in from crawlers.
Note: This Question is unanswered, help us to find answer for this one
45. High humidity and wet weather can cause an increase in electrical ____ over a telephone system.
Answer
Correct Answer:
Crosstalk
Note: This Question is unanswered, help us to find answer for this one
46. An approach where free content is available up to a point at which fees begin, is called a _____.
Note: This Question is unanswered, help us to find answer for this one
47. A drug user who reports "hearing" colors and "seeing" sounds has most likely used ___________
Note: This Question is unanswered, help us to find answer for this one
48. Energy in most ecosystems must flow through autotrophs because ______.
Answer
Correct Answer:
Only autotrophs can convert solar energy into chemical energy
Note: This Question is unanswered, help us to find answer for this one
49. Energy from hot magma is called ____.
Answer
Correct Answer:
Geothermal
Note: This Question is unanswered, help us to find answer for this one
50. Energy conservation in the united states ________.
Answer
Correct Answer:
Can be improved as individuals make conscious choices to reduce personal consumption
Note: This Question is unanswered, help us to find answer for this one
51. The weight of a body minus the fat content is known as the ____.
Answer
Correct Answer:
lean body mass
Note: This Question is unanswered, help us to find answer for this one
52. Amazon.com took crowdsourcing mainstream with its micro-task marketplace called ________.
Answer
Correct Answer:
Mechanical Turk
Note: This Question is unanswered, help us to find answer for this one
53. ________________ is the process of analyzing data warehouses for gems.
Answer
Correct Answer:
Data searching
Note: This Question is unanswered, help us to find answer for this one
54. To enhance salespeople's ability to cross-sell, the organization can perform _______.
Answer
Correct Answer:
market-basket analysis
Note: This Question is unanswered, help us to find answer for this one
55. The balanced scorecard method is based on __________ dimensions of a firm's performance.
Note: This Question is unanswered, help us to find answer for this one
56. The final task in designing a management information system (mis) is _____.
Answer
Correct Answer:
Providing information in a useful format for decision-making purposes
Note: This Question is unanswered, help us to find answer for this one
57. Raid 0 technology is based on ____________________.
Note: This Question is unanswered, help us to find answer for this one
58. _____ is a method for analyzing and reducing a relational database to its most streamlined form.
Answer
Correct Answer:
Normalization
Note: This Question is unanswered, help us to find answer for this one
59. The actionlistener interface contains the ____ method specification.
Answer
Correct Answer:
ActionPerformed(ActionEvent e)
Note: This Question is unanswered, help us to find answer for this one
60. ____ is increasingly being tied to crime and even death in some countries.energy vampires
Answer
Correct Answer:
Internet addiction
Note: This Question is unanswered, help us to find answer for this one
61. The pre-training phase primarily involves _____.
Answer
Correct Answer:
Preparing, motivating, and energizing trainees to attend the learning event
Note: This Question is unanswered, help us to find answer for this one
62. The haptic interface relays the sense of _____ in the virtual world.
Note: This Question is unanswered, help us to find answer for this one
63. In bronfenbrenner's ecological-systems approach, the _____ refers to the interactions among systems
Answer
Correct Answer:
Macrosystem.
Note: This Question is unanswered, help us to find answer for this one
64. Conversion to an e-commerce or m-commerce system enables organizations to _________.
Answer
Correct Answer:
Improve the level of customer service
Note: This Question is unanswered, help us to find answer for this one
65. Commerce service providers are also called _____ service providers.
Note: This Question is unanswered, help us to find answer for this one
66. A(n) ________ is a bi feature that presents performance data defined by users.
Answer
Correct Answer:
Dashboard.
Note: This Question is unanswered, help us to find answer for this one
67. _____ knowledge is hard to measure and document and typically is not objective or formalized.
Note: This Question is unanswered, help us to find answer for this one
68. Resonance occurs when ____ and _____ are equal.
Answer
Correct Answer:
XL and XC
Note: This Question is unanswered, help us to find answer for this one
69. The length ____ contains the number of elements in the array.
Note: This Question is unanswered, help us to find answer for this one
70. Another name for an input in a function is a(n) ________.
Note: This Question is unanswered, help us to find answer for this one
71. If you are worried you might be laid off, it is important to _________.
Answer
Correct Answer:
Mentor other employees, so you can have active associations
Note: This Question is unanswered, help us to find answer for this one
72. When using a(n) _____ join, only rows that meet the given criteria are returned.
Note: This Question is unanswered, help us to find answer for this one
73. When it comes to right-of-way, ""first in, first out"" means _____.
Answer
Correct Answer:
Yield to any road users who arrived before you
Note: This Question is unanswered, help us to find answer for this one
74. When an exception occurs it is said to have been ________.
Note: This Question is unanswered, help us to find answer for this one
75. To remove characters from only the beginning of a string, use the ____ method.
Note: This Question is unanswered, help us to find answer for this one
76. To close the resultset, use ____.
Answer
Correct Answer:
Mysqli_free_result
Note: This Question is unanswered, help us to find answer for this one
77. To arrange the elements in an array in ascending order, you use the ____ method.
Answer
Correct Answer:
Array.Sort
Note: This Question is unanswered, help us to find answer for this one
78. To append output to an existing file, you use ____.
Note: This Question is unanswered, help us to find answer for this one
79. There are two types of security: ____ and ____.
Answer
Correct Answer:
physical, logical
Note: This Question is unanswered, help us to find answer for this one
Engineering MCQs | Topic-wise